找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Introduction to Secure Outsourcing Computation; Xiaofeng Chen Book 2016 Springer Nature Switzerland AG 2016

[復(fù)制鏈接]
查看: 55073|回復(fù): 35
樓主
發(fā)表于 2025-3-21 16:18:23 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Introduction to Secure Outsourcing Computation
編輯Xiaofeng Chen
視頻videohttp://file.papertrans.cn/475/474158/474158.mp4
叢書名稱Synthesis Lectures on Information Security, Privacy, and Trust
圖書封面Titlebook: Introduction to Secure Outsourcing Computation;  Xiaofeng Chen Book 2016 Springer Nature Switzerland AG 2016
描述With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.
出版日期Book 2016
版次1
doihttps://doi.org/10.1007/978-3-031-02348-4
isbn_softcover978-3-031-01220-4
isbn_ebook978-3-031-02348-4Series ISSN 1945-9742 Series E-ISSN 1945-9750
issn_series 1945-9742
copyrightSpringer Nature Switzerland AG 2016
The information of publication is updating

書目名稱Introduction to Secure Outsourcing Computation影響因子(影響力)




書目名稱Introduction to Secure Outsourcing Computation影響因子(影響力)學(xué)科排名




書目名稱Introduction to Secure Outsourcing Computation網(wǎng)絡(luò)公開度




書目名稱Introduction to Secure Outsourcing Computation網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Introduction to Secure Outsourcing Computation被引頻次




書目名稱Introduction to Secure Outsourcing Computation被引頻次學(xué)科排名




書目名稱Introduction to Secure Outsourcing Computation年度引用




書目名稱Introduction to Secure Outsourcing Computation年度引用學(xué)科排名




書目名稱Introduction to Secure Outsourcing Computation讀者反饋




書目名稱Introduction to Secure Outsourcing Computation讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:34:48 | 只看該作者
Book 2016The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.
板凳
發(fā)表于 2025-3-22 00:42:36 | 只看該作者
地板
發(fā)表于 2025-3-22 07:33:38 | 只看該作者
978-3-031-01220-4Springer Nature Switzerland AG 2016
5#
發(fā)表于 2025-3-22 09:54:38 | 只看該作者
Introduction to Secure Outsourcing Computation978-3-031-02348-4Series ISSN 1945-9742 Series E-ISSN 1945-9750
6#
發(fā)表于 2025-3-22 13:35:24 | 只看該作者
Introduction,In this chapter, we present the security challenges and formal definitions of secure outsourcing computation. We also introduce the general outsourcing framework of an arbitrary function introduced by Gennaro, Gentry, and Parno [74].
7#
發(fā)表于 2025-3-22 18:55:46 | 只看該作者
Preliminaries,In this chapter, we introduce some preliminaries for this book. We assume that the readers have some basic knowledge of number theory, basic algebra, and cryptography and thus will not present them here.
8#
發(fā)表于 2025-3-22 23:53:27 | 只看該作者
9#
發(fā)表于 2025-3-23 04:49:35 | 只看該作者
Secure Outsourcing of Scientific Computations,tion to the problem of how to securely outsource different kinds of expensive computations. Abadi et al. [2] first proved the impossibility of secure outsourcing an exponential computation while locally doing only polynomial time work. Therefore, it is meaningful only to consider outsourcing expensive polynomial time computations.
10#
發(fā)表于 2025-3-23 06:07:56 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-6 20:19
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
喜德县| 池州市| 湾仔区| 六枝特区| 三原县| 监利县| 丰宁| 永城市| 高台县| 额济纳旗| 麦盖提县| 溧水县| 古田县| 灌云县| 邵武市| 阜宁县| 万安县| 五河县| 英超| 东辽县| 彰化市| 南岸区| 从化市| 抚远县| 普兰县| 旺苍县| 东阿县| 乌鲁木齐市| 济宁市| 灵石县| 息烽县| 无为县| 岗巴县| 饶河县| 施秉县| 盈江县| 苏尼特右旗| 抚松县| 建湖县| 肇东市| 如皋市|